TLDR:
Avast researchers discovered that the Lazarus Group, a North Korean hacker group, used a zero-day vulnerability in the Windows AFD.sys driver to gain unauthorized access to sensitive areas of targeted systems. Microsoft issued a patch to address the flaw, highlighting the importance of cybersecurity measures against advanced cyber threats like those orchestrated by the Lazarus Group.
Security researchers at Avast uncovered evidence that the Lazarus Group exploited a zero-day vulnerability in the Windows AFD.sys driver to gain kernel-level access.
The flaw, identified as CVE-2024-38193, was patched by Microsoft in June 2024 as part of the Patch Tuesday updates.
The Lazarus Group, believed to be backed by the North Korean government, is known for targeting various industries with high-profile cyberattacks.
The group used a stealthy malware known as Fudmodule to evade detection while exploiting the vulnerability to gain access to sensitive system areas.
Microsoft released a patch to address the vulnerability, emphasizing the importance of proactive cybersecurity measures against sophisticated cyber threats.
Overall, the discovery of this zero-day vulnerability exploited by the Lazarus Group underscores the critical need for effective cybersecurity practices and timely updates to protect against advanced cyber threats in today’s digital landscape.